• Title/Summary/Keyword: embedding capacity

Search Result 127, Processing Time 0.023 seconds

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images

  • Lee, Chin-Feng;Chang, Chin-Chen;Li, Guan-Long
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2554-2575
    • /
    • 2020
  • Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the data size into a small compressed code, which can effectively reduce the time when transmitting compressed code on the network. In this paper, the main objective is to effectively combine these two technologies. We designed a data hiding scheme based on two techniques which are turtle-shell information hiding scheme and absolute moment block truncation coding. The experimental results showed that the proposed scheme provided higher embedding capacity and better image quality than other hiding schemes which were based on absolute moment block truncation coding.

Solution of the Drum-Buffer-Rope Constraint Scheduling Problems incorporated by MRP/JIT - (MRP와 JIT에 부합하는 DBR 제약일정계획문제 해법)

  • 김진규
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.59
    • /
    • pp.21-36
    • /
    • 2000
  • The drum-buffer-rope(DBR) system is a finite scheduling mechanism that balances the flow of the production system. DBR controls the flow of materials through the plant in order to produce products in accordance with market demand, with a minimum of manufacturing lead time, inventory, and operating expenses. This paper integrates the best of MRP push system and JIT pull system with DBR system, efficiently adapts these logics to capacity constraint resources, and contributes to the evolution of synchronous manufacturing. The purpose of this paper is, thus, threefold. The first objective is to identify the frame of theory of constraints(TOC) and the logic of DBR scheduling. The second objective is to formulate the DBR constraint scheduling problems(DBRCSP) in a job shop environments. Finally, the paper is to suggest the solution procedure of DBRCSP for embedding TOC into MRP/JIT along with an numerical expression. In addition, illustrative numerical example is given.

  • PDF

Why Korean Is Not a Regular Language: A Proof

  • No, Yong-Kyoon
    • Language and Information
    • /
    • v.5 no.2
    • /
    • pp.1-8
    • /
    • 2001
  • Natural language string sets are known to require a grammar with a generative capacity slightly beyond that of Context Free Grammars. Proofs regarding complexity of natural language have involved particular properties of languages like English, Swiss German and Bambara. While it is not very difficult to prove that Korean is more complex than the simplest of the many infinite sets, no proof has been given of this in the literature. I identify two types of center embedding in Korean and use them in proving that Korean is not a regular set, i.e. that no FSA's can recognize its string set. The regular language i salam i (i salam ul$)^j$ michi (key ha)^k$ essta is intersected with Korean, to give {i salam i (i salam ul$)^j$ michi (key ha$)^k$ essta i $$\mid$$ j, k $\geq$ 0 and j $\leq$ k}. This latter language is proved to be nonregular. As the class of regular sets is closed under intersection, Korean cannot be regular.

  • PDF

High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection

  • Kaur, Arashdeep;Dutta, Malay Kishore
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.133-145
    • /
    • 2018
  • Robustness, payload, and imperceptibility of audio watermarking algorithms are contradictory design issues with high-level security of the watermark. In this study, the major issue in achieving high payload along with adequate robustness against challenging signal-processing attacks is addressed. Moreover, a security code has been strategically used for secure transmission of data, providing tamper detection at the receiver end. The high watermark payload in this work has been achieved by using the complementary features of third-level detailed coefficients of discrete wavelet transform where the human auditory system is not sensitive to alterations in the audio signal. To counter the watermark loss under challenging attacks at high payload, Daubechies wavelets that have an orthogonal property and provide smoother frequencies have been used, which can protect the data from loss under signal-processing attacks. Experimental results indicate that the proposed algorithm has demonstrated adequate robustness against signal processing attacks at 4,884.1 bps. Among the evaluators, 87% have rated the proposed algorithm to be remarkable in terms of transparency.

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

Analysis for Nonlinear Behavior of Concrete Panel Considering Steel Bar Buckling (철근 좌굴을 고려한 콘크리트 패널의 비선형 거동에 대한 해석)

  • Lee, Sang-Sup;Park, Keum-Sung;Bae, Kyu-Woong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.6
    • /
    • pp.130-137
    • /
    • 2018
  • Many constitutive models for concrete have been developed to predict the nonlinear behavior of concrete members considerably. The constitutive model for reinforcing bar that include the tension stiffening effect due to the bond characteristics between steel bars and concrete is being studied but the bilinear model is generally used. It was found that the buckling of the longitudinal reinforcing bars is controlled the nonlinear behavior of hybrid precast concrete panel, which is being developed for core wall. In this study, the constitutive models that can consider the embedding and buckling effects of reinforcing bar are investigated and a new model combing these constitutive models is proposed. In order to verify the proposed model, the analysis results are compared with experimental results of the concrete wall and hybrid precast concrete panel. The analysis of embedding-effect-only modeling predicted that the deformation increases continually without the decrease in the load carrying capacity. However, the analysis results of proposed model showed good agreement with some experimental results, thus verifying the proposed computational model.

Design and Implementation of Smart Self-Learning Aid: Micro Dot Pattern Recognition based Information Embedding Solution (스마트 학습지: 미세 격자 패턴 인식 기반의 지능형 학습 도우미 시스템의 설계와 구현)

  • Shim, Jae-Youen;Kim, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.346-349
    • /
    • 2011
  • In this paper, we design a perceptually invisible dot pattern layout and its recognition scheme, and we apply the recognition scheme into a smart self learning aid for interactive learning aid. To increase maximum information capacity and also increase robustness to the noises, we design a ECC (error correcting code) based dot pattern with directional vector indicator. To make a smart self-learning aid, we embed the micro dot pattern (20 information bit + 15 ECC bits + 9 layout information bit) using K ink (CMYK) and extract the dot pattern using IR (infrared) LED and IR filter based camera, which is embedded in the smart pen. The reason we use K ink is that K ink is a carbon based ink in nature, and carbon is easily recognized with IR even without light. After acquiring IR camera images for the dot patterns, we perform layout adjustment using the 9 layout information bit, and extract 20 information bits from 35 data bits which is composed of 20 information bits and 15 ECC bits. To embed and extract information bits, we use topology based dot pattern recognition scheme which is robust to geometric distortion which is very usual in camera based recognition scheme. Topology based pattern recognition traces next information bit symbols using topological distance measurement from the pivot information bit. We implemented and experimented with sample patterns, and it shows that we can achieve almost 99% recognition for our embedding patterns.

Embedding Cobalt Into ZIF-67 to Obtain Cobalt-Nanoporous Carbon Composites as Electrode Materials for Lithium ion Battery

  • Zheng, Guoxu;Yin, Jinghua;Guo, Ziqiang;Tian, Shiyi;Yang, Xu
    • Journal of Electrochemical Science and Technology
    • /
    • v.12 no.4
    • /
    • pp.458-464
    • /
    • 2021
  • Lithium ion batteries (LIBs) is a kind of rechargeable secondary battery, developed from lithium battery, lithium ions move between the positive and negative electrodes to realize the charging and discharging of external circuits. Zeolitic imidazolate frameworks (ZIFs) are porous crystalline materials in which organic imidazole esters are cross-linked to transition metals to form a framework structure. In this article, ZIF-67 is used as a sacrificial template to prepare nano porous carbon (NPC) coated cobalt nanoparticles. The final product Co/NPC composites with complete structure, regular morphology and uniform size were obtained by this method. The conductive network of cobalt and nitrogen doped carbon can shorten the lithium ion transport path and present high conductivity. In addition, amorphous carbon has more pores that can be fully in contact with the electrolyte during charging and discharging. At the same time, it also reduces the volume expansion during the cycle and slows down the rate of capacity attenuation caused by structure collapse. Co/NPC composites first discharge specific capacity up to 3115 mA h/g, under the current density of 200 mA/g, circular 200 reversible capacity as high as 751.1 mA h/g, and the excellent rate and resistance performance. The experimental results show that the Co/NPC composite material improves the electrical conductivity and electrochemical properties of the electrode. The cobalt based ZIF-67 as the precursor has opened the way for the design of highly performance electrodes for energy storage and electrochemical catalysis.

A Multi-speaker Speech Synthesis System Using X-vector (x-vector를 이용한 다화자 음성합성 시스템)

  • Jo, Min Su;Kwon, Chul Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.675-681
    • /
    • 2021
  • With the recent growth of the AI speaker market, the demand for speech synthesis technology that enables natural conversation with users is increasing. Therefore, there is a need for a multi-speaker speech synthesis system that can generate voices of various tones. In order to synthesize natural speech, it is required to train with a large-capacity. high-quality speech DB. However, it is very difficult in terms of recording time and cost to collect a high-quality, large-capacity speech database uttered by many speakers. Therefore, it is necessary to train the speech synthesis system using the speech DB of a very large number of speakers with a small amount of training data for each speaker, and a technique for naturally expressing the tone and rhyme of multiple speakers is required. In this paper, we propose a technology for constructing a speaker encoder by applying the deep learning-based x-vector technique used in speaker recognition technology, and synthesizing a new speaker's tone with a small amount of data through the speaker encoder. In the multi-speaker speech synthesis system, the module for synthesizing mel-spectrogram from input text is composed of Tacotron2, and the vocoder generating synthesized speech consists of WaveNet with mixture of logistic distributions applied. The x-vector extracted from the trained speaker embedding neural networks is added to Tacotron2 as an input to express the desired speaker's tone.